Search
  • 网站搜寻
亚洲知识产权资讯网为知识产权业界提供一个一站式网上交易平台,协助业界发掘知识产权贸易商机,并与环球知识产权业界建立联系。无论你是知识产权拥有者正在出售您的知识产权,或是制造商需要购买技术以提高操作效能,又或是知识产权配套服务供应商,你将会从本网站发掘到有用的知识产权贸易资讯。
返回搜索结果

Robust Device Authentication for Integrated Circuits


详细技术说明

Physical Unclonable Function Authentication with Self CorrectionA lightweight, secure and reliable method authenticates chip-unique signatures from integrated circuits to address electronics counterfeiting. The method, based on Physical Unclonable Function (PUF) authentication, uses a key (selected for authentication purposes) with a two-level finite-state machine (FSM) to correct erroneous bits in the authentication process that can be generated by age, temperature, voltage, and various environmental variations. The technology includes a FSM and a physical structure that provides a response to a challenge. However, before the physical structure is ever provided with the challenge, the response to the challenge is unpredictable. The FSM moves from an initial state to an intermediate state when it receives a response from the physical structure, and moves from the intermediate state to a final state when it receives a key. The final state indicates whether the physical structure is a counterfeit physical structure.More Efficient Error Correcting CodePUFs extract chip-unique signatures from integrated circuits (ICs) by exploiting uncontrollable randomness due to manufacturing process variations. These signatures can then be used for many hardware security applications such as authentication, anti-counterfeiting, IC metering, signature generation and obfuscation. However, most of these applications require error correcting methods to produce consistent PUF responses across different environmental conditions. Sometimes, due to environmental variations, PUF signatures are erroneous, and while an error correction coder can correct these errors, it requires a large increase in hardware. This technology generates the correct signature, without requiring any additional error correction circuitry, by associating a key with the signature during the design time. Experimental results show that this self-correcting two-level FSM approach costs significantly less than commonly used error correcting codes. In addition, the new method consumes 2 to 10 times less area and 20 to 100 times less power than previous technology.BENEFITS AND FEATURES:Authenticates chip-unique signatures from integrated circuitsPhysical Unclonable Function (PUF) authenticationSelf-correcting two-level finite-state machine (FSM) approach associates a key with the signatureCorrects erroneous bits in authentication processPhysical structure provides a response to a challengeLightweight, secure and reliableSignificantly lower cost than commonly used error correcting codesConsumes 2 to 10 times less areaUses 20 to 100 times less powerAPPLICATIONS:Integrated circuit chipsIntegrated devicesAnti-counterfeiting measuresPhase of Development - Prototype development


国家/地区

美国

欲了解更多信息,请点击 这里
Business of IP Asia Forum
桌面版